SHARE
Facebook X Pinterest WhatsApp

Xceedium Extends VMware Compliance Reach into the Cloud

In a world where virtual machines and the guest operating systems that ride on top of them can come and go in a matter of minutes, keeping track of who accessed what can be problematic. Xceedium this week announced that IT organizations running VMware can now rise to that challenge using XSuite for VMware, a […]

Written By
MV
Mike Vizard
Feb 14, 2013

In a world where virtual machines and the guest operating systems that ride on top of them can come and go in a matter of minutes, keeping track of who accessed what can be problematic.

Xceedium this week announced that IT organizations running VMware can now rise to that challenge using XSuite for VMware, a privileged identity and access management tool that this week has now been updated to add support for instances of VMware running on-premise or in the cloud.

According to Xceedium CEO Glenn Hazard, privileged users still represent the greatest risk to any organization. With the ability to spin up virtual machines at a moment’s notice almost anywhere in the world, keeping track of which user accessed what virtual machine or guest operating system in the cloud has been nearly impossible.

Unfortunately for IT organizations, compliance regulations don’t make any exceptions for virtual machines running in the cloud. Hazard says XSuite for VMware not only provides a full audit trail, organizations can actually play back entire sequences of events to discover exactly what action was taken when, even on guest operating systems running on top of VMware.

Integrated with Microsoft Active Directory, Hazard says XSuite for VMware has been specifically designed to integrate with identity management processes in a way that extends them out to the cloud.

The days when IT organizations might be excused for not having any visibility into the cloud are quickly coming to a close. It’s pretty clear at this point that the cloud represents another tier of enterprise computing that has to be managed like any other. As a result, all the same IT management and compliance policies need to be applied regardless of where a virtual machine may be running at any given time.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Strategies for Successful Data Migration
Kashyap Vyas
May 25, 2022
Leveraging AI to Secure CloudOps as Threat Surfaces Grow
ITBE Staff
May 20, 2022
The Emergence of Confidential Computing
Tom Taulli
Apr 20, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.